This mind map is about Empowerment Technologies. Start to use a mind map to express and organize your ideas and knowledge right now.
Similar Mind Maps
Mindmeister (mind mapping)
A mind map is a spider diagram that consists ofcentralized subjects
Add child topics by pressing &+& or TAB
Type (ENTER) to add a sibling topic
Drag and drop topics according to theirsupposed positions
Create floating topics on child topics bypressing TAB
You can select a theme by changing font colorsand backgrounds of the topics
You can customize your own styles
You can add icons, pictures, and even files
You can create slides
You can add transitions
Effective Powerpoint Presentations
32 is the minimum font
48 is better
No all caps
avoid text overload
not more than 6
6 7 words per bullet
Capitalization must be monitored
Use dark font for light colored backgrounds andlight font for dark ones
Place graphics off center
more room for text
place graphics on left side
select good illustrations
every image has a reason
animated gifs should be discouraged
10 20 30
20 minutes presentation
30 is the minimum font
It is a cross platform image editor available forGNU/linux,Osx, windows, and more operatingsystems
GNU Image Manipulation Program
Joint Photographic Experts Group (JPEG)
Portable Network Graphics (PNG)
Graphics Interchange Format (GIF)
A computer program to create electronicspreadsheets
Relative cell reference
if the position of the cell that contains thereference changes, the reference itself ischanged.
Absolute cell reference
If the position of the cell that contains theformula changes, the absolute reference remainthe same
DATED IF FUNCTION
SUM IF FUNCTION
SUM IFS FUNCTION
=IF(LOGICALTEXT,VALUE IF TRUE, VALUE IFFALSE)
Internet and Research
The studious inquiry or examination accordingto Merriam Webster.
It is not just browsing the web but to expandcurrent knowledge.
Research is systematic
Identify the problem (spend sufficient time toknow what you are searching for)
Formulate the hypothesis (proposed solutionto the problem)
Start with your related literature (anything thatcontains information related to the problem)
How to improve gathering data?
Understand articles by...
Skim and scan
How to use internet for research?
Refining search queries
use special characters to refine your search
(quotes) enclosing a search in quotation marksforces Google to search for the exact quotedphrase.
(wildcard) a placeholder for reserch
(tilde) Use to search synonymous words
(OR) searches alternatives
(range) use to search for values in between anupper and lower bound.
Synthesize and state your conclusion
State your conclusion if you have enoughinformation to answer your problem.
PRACTICE A LOT OF TIMES
Use of APA format
Perspective is key
The online community poof people with thecommon interest with the use of the web
Sites that facilitates social network are callednetworking sites.
Creating an account
Choose a secure password
Do not use the same password as your otheronline accounts
Personalizing your profile
Change your display picture
Change your cover photo
Change your profile information
Know what to share
Do not include sensitive information in yourprofile.
Make sure your photos do not reveal sensitiveinfo as well.
Sending a friend request
You can send a request to those you want toconnect with.
Other users can send requests to you.
Be safe when sending requests
Only send requests you really know.
Only accept requests by people you really know
Everyone can create an account in a socialnetworking site.
A person might pretend as another person.
Keep this in mind when sending friend requests.
Profile space where all content is posted.
Everyone has their own wall/timeline.
Posting on the wall
You can post on your own or other's wall
pics, links, and videos may be included in yourpost's attachment.
Updates from friends
It may be controlled by privacy settings set bythe user.
Privacy settings on post
You can control who sees your posts.
You can create groups on your contacts list tomake this easier.
Privacy settings on wall
You can chose who can see your wall
Privacy is only for the post and not the content
You can tag photos or posts with other people
They can also tag you.
Privacy settings in tagging
Be aware of people tagging someone else whocan see the post.
Likes and comments
You can like a certain post
Further reactions of user are seen in thecomments section.
You can talk to your fellow your users through achat box.
Video call has been supported by it as well.
Stay safe with Chat
Identifies you in the site
Posts that limits until 140 characters only
The use of hashtags to indicate a certain trend.
Follow people to let their tweets appear yourtimeline.
You can set your tweets protected
Manage how people find you
Control how people will find you in the site.
Use the @ sign to mention a person.
This is similar to &sharing& a post in Facebook.
You can &favorite& a tweet which is similar toliking a Facebook status.
It is designed to encourage users to post shortmessages often.
You can turn off this feature.
Automatically indicate your location.
You can turn off this feature.
A social networking site that posts pictures.
You can &follow& people to see their pictures.
You can post photos or videos.
Use mobile app to capture picture or video.
It is optional to add and tag people
Do not show photos and videos that showsensitive information.
Social Media Benefits
Drives participation of citizens to be active
Makes people content creators, managers, anddistributors.
Encourages people to explore and learn
Makes sharing of information andcommunication easy.
Helps develop key and real world skills.
Someone can deliberate someone else's identity.
How to deal with cyberbullying?
Screenshots of attacks
inform love ones and authorities
report the account being used to bully people
Maintain our own &personal brand& in theinternet.
There is no real &delete&
Once posted, always posted
Think twice before posting anything on socialmedia.
Unauthorized person gains access to youraccount.
Avoid being hacked
Common Computer Problems andTroubleshooting Security
Illegal acts in the web
Beware of the intruders
People accessing networks illegally.
People accessing networks illegally but has theintent to destroy data.
Prewritten hacking and cracking programs tobreak into computers.
Hired to break into computers
Uses email as a medium for extortion.
Uses internet to damage computers for politicalreasons.
Virus altering computer works without user's knowledge
Worm programs copy itself
Trojan horse hides legitimate programs
Protect your password
Avoid hardware theft by...
password locks on laptops
synchronize photo storage
Install software on one computer
renting of software is not allowed
distribution of software is not allowed
creation of multiple copies is not allowed
not enough hard disk space
Not enough physical memory
delete unnecessary files to solve
disables a program on startup
rearrange data blocks of files
Strange noises on the computer
Printer is not working
Can't access to wifi
Carpal tunnel syndrome
computer vision syndrome
Ergonomics and workplace design
The Rise of Information Capitalism
A View at the Information Society
Before: Physical stores and product distribution
After: Virtual products (Books, Music, etc.)
Before: F2F Meetings
Before: Information Dissemination
After: Netizen involvement and influence
Before: Traditional Learning
After: Well Roundedness, E Learning
Before: Traditional Courtships
Before: Hospital and F2F Professional Diagnosisand monitoring
After: Self Diagnosis, E Health
Datafy Now! Everything will be digital
Quicker decision support and automation
Real time delivery of data and increasinglyprocessed at the network edge
Everything on the Cloud!
Wide geographical reach
Work anytime, anywhere
&All in One& Convenience
Prevent intrusive and violation to privacy
&Before, during, and after& approach
Self Organizing Business Model Applications
Uber, Linkedln, AirBNB, Waze
20 billion connected devices
Exponential growth of digital information
Video and Pervasive Screens
Watching whatever, wherever, whenever...
Video captures for message delivery,messaging, advertising, etc.
Smart cars, smart homes, smart appliances
The smaller, the more powerful
IT Experts Acquisitions
Non IT companies will acquire technologycompanies for analytics, innovations, and mainoperations
The Core Rules Of Netiquette
1) Remember the human
We have the free will to explore the net and wehave the responsibility to respect the people asnet users even if our life profile is hidden.
2) Adhere to the same standards of behavioronline that you follow in real life
It is important to be ethical inside the webbecause rules that we follow in real life are stillapplied in the net.
3) Know where you are in cyberspace
Check the unknown site you are visitingbecause any site can be illegal and it mightbring you as a user to danger.
4) Respect other people's time and bandwidth
Before copying people on your messages, askyourself whether if it is really important forthem to know about the information you areconveying.
5) Make yourself look good online
Do not give yourself a bad impression toeveryone because it will show how cruel theweb can be to new users without knowing thatsome sites are much friendlier than others.
6) Share expert knowledge
The world stay connected through the web toget to know each other very well. Questioningand answering people will show a goodimpression to your fellow users.
7) Help keep flame wars under control
Prevent the series of angry letters of usersbecause it destroys the camaraderie of adiscussion group.
8) Respect other people's privacy
Do not interfere with a user's profile since youhave no involvement.
9) Don't abuse your power
Your expertise in every office and system doesnot allow you to take advantage of other users.
10) Be forgiving of other people's mistakes
Allow your senses to forgive the web users whohave caused trouble through his/her mistakes inthe web.
A list of people you intend to send letters
personalize bulk mail
Finish and Merge
Edit individual documents
Save = Ctrl + S
Paste = Ctrl + V
Bold = Ctrl + B
Italic = Ctrl + I
Underline = Ctrl + U
Current State of ICT
What is ICT
It means Information and CommunicationTechnology
It is the application of telecommunicationtechniques that enables society to create,collect, consolidate, communicate, and processinformation in multimedia.
According to UNESCO, it is “The scientific,technological and engineering disciplines andthe management
techniques used to handle and transmitinformation [between] men and
According to Digital Video Technical Glossary, itis “The computing and communicationsfacilities and features that support
teaching, learning and a range of activities ineducation.”
The Impact of ICT to Society
It has allowed exchanging of informationanytime and anywhere in digital formats.
It gives the essential ingredient in developingnew ideas.
The development of communication systemsunderlies this topic.
It has linked up arts of the world.
ICT decreased the distance between the worldcloser to us.
The Impact of ICT in Scientific Exploration
It helps scientists able to invent new technologyfor terrestrial use or in space.
It finds new ways of communicating over vastdistances.
Powerful computers, satellites, and rockets areinventions with the influence of ICT that arecapable to send men in space withcommunication.
The Impact of ICT in the Military
To protect the arm from enemies with a goodnetwork of communication.
It plays a key role in developing and organizedmilitary force providing real time information.
The Impact of ICT in Economy
It brings strong economical structure in thefinancial growth of a country.
It handles the economic backbone whichstrengthens the economy by providing properknowledge about the economy of developedcountries.
The Impact of ICT in Recreation
It gives a number of recreational componentssuch as digital television, online or mobile radio,DVD, Blu-ray, Mp3, game consoles, mobilereading, and gaming devices.
The Impact of ICT in Transportation
It decreases the distance between places, savevaluable travel time, and has provided an easytransport.
It can narrow travelling shorter to get to thedestination swiftly.
The Impact of ICT in Knowledge Management
It makes processing knowledge anddisseminating easier to the others.
The Impact of ICT in Information Institution
It plays roles in library and other informationinstitutions with the possibility to...
Process information in digital format
networking and sharing information resourcesare possible
It saved library space by creating digital librarymaterials
Online access and file transfer in libraries
The Impact of ICT on User Communities
Influence community users in different ways
Increase level of technology literacy
Increase demand for better access toinformation
Aggravates discrepancies between poorinformation and rich information
Establish a balanced service for all user stages
It kept users updated by being provided withcurrent information
Skills are improved in using technologicalcomponents of the computer
Trends in ICT
In a nutshell
From your research...
Modular or Wearable Devices and Gadgets
Virtual Reality and Immersion
Face Recognition and Applications
Voice Recognition and Applications
It is described as the science of makingcomputers do things that require humanintelligence
Computational models inspired by an animal's central nervous system which is capable ofmachine learning
A user interface
Allows a non expert user to query the expertsystem
A knowledge base
Collection of facts and rules
An inference engine
Acts rather like search engine that examinesknowledge base for information